Major
Threats and Drivers to CIA Triangle
The
threat, in the sense of information security, is an activity that is possibly
dangerous to the information or operations. Drivers, on the other hand, are the
activities that make it possible for the operation to be in place and meet the
expectations. Confidentiality, integrity, and availability (CIA) triad has some
major threats and drivers. Major threats to the CIA triad are viruses and
worms, unauthorized intrusion, and denial of service (Perrin, 2008).
·
Viruses
and worms: Viruses and worms from computer programs from
working properly. This threatens the confidentiality, integrity, and
availability of the information.
·
Unauthorized
intrusion: This is accessing the computer system without the
authorization of the owner. People who access computer systems are referred to
as hackers. Hacking threatens the confidentiality, integrity, and availability
of information stored in the system (De et al., 2014).
·
Denial
of service: It is popularly known as DoS attack. However, it
is not for stealing information, but it brings down the targeted network thus
denying the authorized users access. This hinders on the availability of the
information.
Although
there are threats to the CIA triad, there are also drivers which help in the
further progress of the information. They are as follows (Sattarova, Feruza,
& Kim, 2007):
·
Cryptography:
This protects against access to the information by unauthorized people.
Therefore, it ensures that confidentiality of the information is maintained.
·
Data
hashing: This is also a type of cryptography which ensures
the information sent through the systems only lands and is read by the intended
people.
·
Data
backup: Data backup is having an exact copy of the
original data and information stored elsewhere to prevent against loss
(Cherdantseva & Hilton, 2013).
References
Cherdantseva, Y., & Hilton, J. (2013,
September). A reference model of information assurance & security. In Availability, reliability and
security (ares), 2013 eighth international
conference
on (pp.
546-555). IEEE.
de, O.
A. R., Villalba, L. J., Orozco, A. L., Buiati, F., & Kim, T. H. (January
01, 2014). A
layered trust information security
architecture. Sensors (basel,
Switzerland), 14, 12,
22754-72.
Perrin, C. (2008). The CIA triad.
Sattarova Feruza, Y., & Kim, T. H. (2007).
IT security review: Privacy, protection, access
control,
assurance and system security. International
Journal of Multimedia and
Ubiquitous
Engineering, 2(2), 17-31.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in non plagiarized research papers if you need a similar paper you can place your order for best custom essay site.
No comments:
Post a Comment